CHALLENGES TO SECURITY IN SPACE

January 24, 2019

Space-based capabilities provide integral support to military, commercial, and civilian applications. Longstanding technological and cost barriers to space are falling, enabling more countries and commercial firms to participate in satellite construction, space launch, space exploration, and human spaceflight. Although these advancements are creating new opportunities, new risks for space-enabled services have emerged. Having seen the benefits of space-enabled operations, some foreign governments are developing capabilities that threaten others’ ability to use space.

Spotlight

RK InfoSec

RK InfoSec was incorporated in the year 2014, to provide end to end Information Security Consulting and Security Solution to corporates. We have a very strong focus on ISMS (ISO27001) Implementation and Audit, Information Systems Audits, IT Network Audits, Vulnerability Assessments, Penetration Testing, Web Application Security Testing, Information Security Solution like Firewalls, DLP, IDS/ IPS, Web Content filtering, Anti-Virus and Technical Support.

OTHER WHITEPAPERS
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More

Spotlight

RK InfoSec

RK InfoSec was incorporated in the year 2014, to provide end to end Information Security Consulting and Security Solution to corporates. We have a very strong focus on ISMS (ISO27001) Implementation and Audit, Information Systems Audits, IT Network Audits, Vulnerability Assessments, Penetration Testing, Web Application Security Testing, Information Security Solution like Firewalls, DLP, IDS/ IPS, Web Content filtering, Anti-Virus and Technical Support.

Events